Back to news

December 18, 2024 | International, C4ISR, Security

HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft

Phishers exploit HubSpot Free Forms to target 20,000 European users, compromising Azure accounts and bypassing security measures with advanced tactics

https://thehackernews.com/2024/12/hubphish-exploits-hubspot-tools-to.html

On the same subject

  • Airbus and Saab consider challenge to Boeing Wedgetail for UK

    July 9, 2018 | International, Aerospace

    Airbus and Saab consider challenge to Boeing Wedgetail for UK

    By: Andrew Chuter and Beth Stevenson LONDON -- Two of Europe's top aerospace defense companies are discussing combining their airborne early warning capabilities in an attempt to head off a possible sole-source British purchase of the Boeing Wedgetail. The talks are centered on a potential collaboration bringing together an Airbus-built platform with a version of Saab's Erieye radar, said two sources familiar with the discussions. But a third source though sought to dampen expectations of a deal saying the talks were not exclusive and both companies were also talking to various other potential partners. The British are considering replacing their venerable, and increasingly unreliable, Boeing Sentry E-3D fleet with a new airborne early warning aircraft for the Royal Air Force. The Sentry's are currently due to stay in service with the RAF until 2035, subject to a capability sustainment program to extend their service life. News that the two companies are discussing a potential tie-up comes just three days after UK Parliamentary defence committee chairman Julian Lewis wrote an open letter to British defense procurement minister Guto Bebb urging the MoD to ensure that any tender for a new surveillance aircraft must be open to fair competition, and not awarded sole-source to the Wedgetail. The letter said that it would be “particularly inappropriate for a competition to be foregone in favour of Boeing following their involvement in the imposition of punitive tariffs against Bombardier last year [over regional jet subsidies].” The fight with Boeing threatened Bombardier manufacturing facilities in Northern Ireland with substantial job losses. Airbus didn't confirm that talks were taking place with Saab. But in a statement, it unsurprisingly supported the calls for an open competition -- and gave a clue as to what it sees as potential platforms for a possible British requirement. “As the biggest supplier of large aircraft to the Royal Air Force, Airbus would welcome a competition to present a market leading and cost-effective solution for the RAF's future AWACS requirements,” said an Airbus spokesman. “Building on our successful experience in converting commercial aircraft into the world's market-leading tanker, Airbus is working on further opportunities to use the A330 and A320 as the basis for new mission aircraft,” said the spokesman. To the same effect, Saab also welcomed an open competition from the government to replace the Sentry fleet, although it did not go into specifics regarding the exact offering it would expect to pitch should a competition be held. “Saab, as the one of the world's leading suppliers of airborne surveillance and air battle management systems, would enthusiastically pursue an open competition to replace the UK's aging E-3D fleet, should the UK MoD choose to issue a requirement,” a company spokesman said. Potential signing Late last month, The Times newspaper reported the MoD was heading for a possible sole source buy of between four and six Wedgetail aircraft at a cost of up to £3 billion to replace the Sentry fleet. The NATO summit in Brussels, the Royal International Air Tattoo, or the Farnborough air show later this month, have been touted as possible venues for an announcement. The MoD declined to comment on whether a Wedgetail deal was likely or imminent. ‘Any decision on the way forward for the Sentry capability will be taken in the best interests of national security in the face of intensifying threats, and only after full consideration. We tender contracts competitively wherever appropriate. It is too early to comment further at this time,' said an MoD spokesman. An Australian air force Wedgetail is scheduled to appear at the RIAT show starting July 13 at Fairford, southern England. The 737-based jet has also been sold to Turkey and South Korea. The letter raised the committee's concerns over the state of the RAF's Sentry fleet, saying it was in a poor state of maintenance and often only a single aircraft in the six strong fleet was available at any one time. A statement accompanying the letter said reports have emerged that as part of the Modernising Defence Programme review being conducted by the MoD it is considering cancelling the sustainment program and replacing the Sentry fleet with a new aircraft. The letter from the lawmakers reflects increasing concern on the committee about the award of non-competitive contracts with overseas companies for major defense equipment requirements. The most recent of those was the MoD decision to buy Artec-built Boxer mechanized infantry vehicles from Germany without a competition, but the U.S. industry has also benefited from several sole-source deals in recent times. Boeing has particularly rankled competitors after winning two major UK contracts in 2016 without a competition: the P-8 Poseidon maritime patrol aircraft and the AH-64E Apache attack rotorcraft, the selection of which were announced at that year's Farnborough air show. Lewis said in the letter that the committee had “in the light of convincing evidence of at least one credible alternative to Wedgetail,” it can see “absolutely no reason why, yet again, to dispense with open competition.” It's not known exactly who the committee is referring to, but an Airbus/Saab combination would appear to qualify as being highly credible. Saab's well regarded Erieye radar has sold widely around the world on turboprop and regional jet platforms with countries like Brazil, Saudi Arabia, Greece and Sweden operating the capability. Most recently it secured a deal with the United Arab Emirates for the delivery of five of the new GlobalEye early warning and control aircraft which uses the Bombardier 6000 business jet as a platform and boasts a new extended range version of Erieye. Saab executives at the roll-out of the GlobalEye in February said they had briefed the British on the aircraft's capabilities, but their view was the RAF still wanted a larger cabin than a business jet could provide. One option to meet that requirement is the possible use of almost new A330 tanker aircraft available under the AirTanker private finance initiative arrangement to provide inflight refuelling capacity to the RAF. Fourteen A330s were built for AirTanker, in which Airbus is a shareholder, with nine aircraft being available constantly for the RAF and the remainder of the airframes leased out to other users, but available for immediate return to air refueling duties in a crisis. The wings of Airbus' commercial airliners are manufactured in the UK, and uncertainty surrounding the terms of the nation's impending exit from the European Union has caused the company to issue a strong warning to the government that it may move the work elsewhere if Brexit does not favor movement of parts, or the certification of the wings in line with European standards. CEO Tom Enders has been vocal on his views regarding the situation, but opening up other areas of work in which companies like Airbus may participate - such as an open competition for the AWACS replacement – could help companies like Airbus who feel the government has overlooked their interests in the UK. Other executive though wonder whether Brexit supporting Government ministers in Britain are in any mood to do Airbus any favors in sectors like defense procurement. https://www.defensenews.com/global/europe/2018/07/06/airbus-and-saab-consider-challenge-to-boeing-wedgetail-for-uk/

  • Robot Dogs Now Have Assault Rifles Mounted On Their Backs

    October 13, 2021 | International, Land

    Robot Dogs Now Have Assault Rifles Mounted On Their Backs

    Robot dogs have been met with equal parts fascination and fear by the public, but their utility for military applications is becoming undeniable.

  • Making DoD Security Operations Centers More Effective: Security Automation

    July 13, 2020 | International, C4ISR, Security

    Making DoD Security Operations Centers More Effective: Security Automation

    Security orchestration, automation, and response (SOAR) software frees DoD analysts to apply cognitive skills to actually fixing problems. By SPLUNKon July 10, 2020 at 6:39 PM The Defense Department's most recent National Defense Strategy (NDS) describes a complex military environment characterized by increased global disorder, a decline in the long-standing rules-based international order, myriad threats from rogue states like Iran and North Korea, great power peers like China and Russia, malicious hackers, and terrorists in places like Yemen. One of the military domains where this dynamic is most evident is cyberspace, where bad actors arguably have comparable or better cyber capabilities than us. “This increasingly complex security environment is defined by rapid technological change, challenges from adversaries in every operating domain, and the impact on current readiness from the longest continuous stretch of armed conflict in our nation's history,” the NDS states. “In this environment, there can be no complacency—we must make difficult choices and prioritize what is most important...” More cybersecurity threats mean more cyberattacks on DoD networks. Essye Miller, former principal deputy for the DoD CIO, said recently that attacks on department networks are surging and that the attack surface is expanding as adversaries target DoD employees working from home during the coronavirus pandemic. This surge in cyberattacks means that analysts working in DoD information security operations centers (SOCs) are being bombarded with security alerts. With so many events, it's hard for them to differentiate true alerts from false ones, and to determine which events are priorities to address immediately. Through no fault of their own, they end up chasing their tail when their time could be better spent on mission-critical activities that directly support warfighters. The solution for this domain is automation. While popular in commercial software segments for years—including SalesForce automation, marketing automation, human resources automation, and IT automation—DoD security teams are just beginning to realize the benefits of what's known as security orchestration, automation, and response. The Value of Security Automation “Automation is nothing new to the military. The Defense Department is making great inroads into DevSecOps, for example,” explained Drew Church, senior security advisor at Splunk, referring to an agile software development process where software is quickly developed, tested, and improved over weeks and months rather than years. “A key, fundamental concept of DevSecOps is automation. The point of automation in DevSecOps is to bring together different technologies, tools, people, and processes to develop code and get it out to the war fighter more rapidly. “Automation provides that same capability inside IT operations procedures, security operations procedures, and other business processes,” said church. “It does this in a reliable and repeatable fashion every time, and at speed and scale.” Splunk's SOAR solution is called Phantom. It helps security teams work to identify, analyze, and mitigate threats facing their organizations. It can be used to improve efficiency, shorten incident response times and reduce the growing backlog of security incidents, even when there's a shortfall of DoD security personnel to analyze the volume of daily security alerts. Phantom does so by integrating teams, processes, and tools, and by automating tasks, orchestrating workflows, and supporting a range of SOC functions to include event and case management, collaboration, and reporting. In essence, it frees SOC analysts of the usual Tier I-type activities of gathering data from the security information and event management (SIEM) platform, prioritizing these alerts, performing triage to determine if an alert is real or a false alarm, configuring and managing security monitoring tools, and generating trouble tickets. Instead, Splunk Phantom lets them spend more time on the value-added work of Tier II SOC analysts. This includes actually investigating the trouble tickets, responding to incidents, and leveraging threat intelligence to better understand the threat and be proactive rather than reactive. “Focusing on the bureaucracy of security rather than the actual doing of security limits the effectiveness of security analysts,” said Church. “Better to free them of the tasks that can be easily automated like reviewing IP addresses, domain names, and URLs so that they can be force multipliers in conducting the thoughtful work needed to protect DoD networks. “That automation is done for them in Phantom. It let's analysts focus on investigating and taking remediation or mitigation steps as appropriate. Where humans excel is in actually thinking through a problem. Copying and pasting from websites, emails, and reports is not the most effective use of a highly paid, resource-limited talent pool.” Integration With Existing SOC Tools SOC analysts make their decisions by gathering information. They sometimes review classified military intelligence, but usually they look at a lot of open-source information and data from commercial off-the-shelf products from myriad providers of cybersecurity threat intelligence products. Some of the common ones that are relevant to the Defense Department include: McAfee's ePolicy Orchestrator, which the DoD refers to as Host Based Security Systems (HBSS); and Tenable's Security Center, which is known inside the DoD as Assured Compliance Assessment Solution (ACAS). Splunk Phantom has more than 300 out-of-the-box integrations with products like HBSS and ACAS. “Being integrated with each of those products permits the analyst to get the information they need without having to go to another browser window, or another tab, or a different computer,” said Church. “Phantom automatically brings all that data to the analyst. That takes somebody who spends most of their time copying information from page A into system B and lets them make more rapid and accurate determinations about the threat.” Through the use of APIs (application programming interface), that same integration is also found with government off-the-shelf (GOTs) solutions that haven't before been integrated with Splunk Phantom because there was never a request to do so. The same goes for a custom app created by a DevSecOps shop like the Air Force's Kessel Run project in Boston, for example. Automating these vital but drudgerous processes also pays dividends during both staffing shortfalls and times of surge, and brings consistency to SOC activities. Military service members are constantly rotating and changing duty stations; senior leadership turns over regularly. Contractors have to be relied upon to provide continuity from tour to tour. That means that SOC processes that were well oiled on a Monday may no longer be operating smoothly on Friday because of a change of command. Or maybe there is a compelling event that grabs everyone's attention. Or possibly there are legal or policy requirements that need to be addressed, and though they don't add mission value they still must be completed. Automation by Splunk Phantom smooths out the bumps associated with those all-to-common scenarios by keeping the flow of vital data moving to where it can be acted upon best. “The computer's running the marathon for you so that you are free to sprint and swarm on the problems that need the most resources at any particular time,” said Church. The Takeaway For security analysts, incident handlers/responders, IT operations managers, security operations managers, and forward-leaning business process experts, Splunk Phantom is all about removing barriers so people can get back to accomplishing the mission, maximizing productivity of skilled personnel and organizations. “For anybody that has a business process, a mission process, an IT operations process, or a security process and wants to free those skilled workers to get back to what you brought them onboard to do, we can help you with that,” said Church. “We do that through orchestration, we do that through automation. We bring in collaboration, and we're able to do that at scale because of the value that a company like Splunk brings to the table. By being able to have a rich ecosystem of partners and support across the board, we're able to do that even with differences from organization to organization.” Splunk Phantom addresses technology-based processes, and orchestrates and automates those processes to get people back to doing what they do best. https://breakingdefense.com/2020/07/making-dod-security-operations-centers-more-effective-security-automation/

All news